Myfitnesspal Security Breach: Change your password!
It uses a higher level of encryption, requires two-factor authentication, and the password requirements are very stringent (ie: You must pick a password at least 15 characters long, it has to have numbers, symbols, letters, and capitalization, etc). You can not use anything that is associated with your data (Ie: any part of your birthdate, name, username, etc).
A note for MFP, they actually stored a fair number of their passwords plain text (even though they mention hashing in their security memo) and none of them were even case sensitive.
The link below shows you how a truly secure password can save you from brute force attack (someone systematically guessing your password).
https://www.password-depot.com/know-how/brute-force-attacks.htm
VSG: 1/17/17
5'7" HW: 283 SW: 229 CW: 135-140 GW: 145
Pre-op: 53 M1: 22 M2: 12 M3: 12 M4: 8 M5: 10 M6: 11 M7: 5 M8: 6 M9-M13: 15-ish
LBL/BL w/ Fat Transfer 1/29/18
on 4/1/18 5:31 pm
After my identity theft problems late last year, I've become uber paranoid about passwords. Those asshats even managed to change my bank email and password, which would have required calling the bank and answering those random identifier questions gleaned from public records (streets you've lived on, counties lived in, banks who you have loans with, car payment amounts, family member names, etc.). They had no problem answering them because I'm 99% sure they had my Equifax report. I use OnePassword and change passwords frequently like I'm in witness protection!
on 4/2/18 3:55 pm
When I worked for a cellular company, at least 10 people a day used "password" or "password123" as their passcode for everything.
"What you eat in private, you wear in public." --- Kat
on 3/29/18 9:05 pm
I thought the same thing. There is nothing to take! I used the same password a couple other minor places though so I changed them all just to be safe.
This is kind of funny timing. I had to change my password because I couldn't remember it when I wanted to log in to the site on a different device. Yay for senior moments!
I woke up in between a memory and a dream...
Tom Petty
on 4/1/18 7:01 am
Well, they didn't get hashed passwords, they got your actual password. It's not really a big deal other than an information leak. They have an e-mail address with a used password they can try on many different websites. Lots of people reuse the same passwords, sadly. And for people that are a paying member of MFP, they also collected their credit card information and bank information.
They will take the email addresses and passwords (which were plain text) and try them on different websites hoping people used the same ones. It's likely they will gain access to banking info or email that way.
VSG: 1/17/17
5'7" HW: 283 SW: 229 CW: 135-140 GW: 145
Pre-op: 53 M1: 22 M2: 12 M3: 12 M4: 8 M5: 10 M6: 11 M7: 5 M8: 6 M9-M13: 15-ish
LBL/BL w/ Fat Transfer 1/29/18